Results 1 to 10 of about 310,612 (190)
Twitter data from the 2019–20 Australian bushfires reveals participatory and temporal variations in social media use for disaster recovery [PDF]
Social media platforms have proved to be vital sources of information to support disaster response and recovery. A key issue, though, is that social media conversation about disasters tends to tail off after the immediate disaster response phase ...
R. Ogie +5 more
doaj +2 more sources
Flood Recovery Outcomes and Disaster Assistance Barriers for Vulnerable Populations
Disaster recovery spending for major flood events in the United States is at an all-time high. Yet research examining equity in disaster assistance increasingly shows that recovery funding underserves vulnerable populations. Based on a review of academic
Bradley Wilson +2 more
doaj +3 more sources
Cross-domain entity identity association analysis and prediction based on representation learning
Cross-domain identity association of network entities is a significant research challenge and a vital issue of practical value in relationship discovery and service recommendation between things in the Internet of things, cyberspace resources surveying ...
Mingcheng Gao +4 more
doaj +1 more source
CDSTAEP: Cross-Domain Spatial-Temporal Association Learning for Abnormal Events Prediction
Predicting network abnormal events and behavior can enhance security situation awareness and the ability to infer attack intentions. Most of the existing abnormal event prediction methods usually rely on the temporal relationship features between events ...
Mingcheng Gao +3 more
doaj +1 more source
Two-thirds of the 111 active volcanoes in Japan are covered with snow for several months during winter and demonstrate high hazard and risk potentials associated with snow-related lahars during and after eruptions.
Kyoko S. Kataoka +4 more
doaj +1 more source
Opportunistic disaster recovery [PDF]
Disaster scenarios require different recovery solutions such as evacuation guidance, to perform the right action for wounded persons and efficiency diffuse useful alert for locating trapped survivors. These latter are constrained mainly by the infrastructure‐less environment caused by the disaster damage (e.g. storm, earthquake).
Farouk Mezghani, Nathalie Mitton
openaire +1 more source
GLPS: A Geohash-Based Location Privacy Protection Scheme
With the development of mobile applications, location-based services (LBSs) have been incorporated into people’s daily lives and created huge commercial revenues.
Bin Liu +3 more
doaj +1 more source
Network planning for disaster recovery [PDF]
Disaster recovery and business continuity issues are becoming fundamental in networks since the importance and social value of digital data is continuously increasing. On the one hand, there is an obvious need of backing up data for resilience against major failures; in many situations the process of storing backup data is also enforced by the law.
BIANCO, ANDREA +4 more
openaire +1 more source
User Identity Linkage Across Social Networks by Heterogeneous Graph Attention Network Modeling
Today, social networks are becoming increasingly popular and indispensable, where users usually have multiple accounts. It is of considerable significance to conduct user identity linkage across social networks.
Ruiheng Wang +5 more
doaj +1 more source
Using User Behavior to Measure Privacy on Online Social Networks
Because social networks exemplify the phenomenon of homogeneity in complex networks, researchers generally believe that a user's privacy disclosure is closely related to that of the users around them, but we find that the related users studied in ...
Xuefeng Li +5 more
doaj +1 more source

